Cover image for Handbook of research on social and organizational liabilities in information security
Handbook of research on social and organizational liabilities in information security
Title:
Handbook of research on social and organizational liabilities in information security
Author:
Gupta, Manish, 1978-
ISBN:
9781605661339
Publication Information:
Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2009.
Physical Description:
electronic texts (xxxvii, 558 p. : ill.) : digital files.
Contents:
Section 1. Organizational Security -- 1. Responsibilities and Liabilities with respect to catastrophes -- 2. The Complex New World of Information Security -- 3. Employee Surveillance Based on Free Text Detection of Keystroke Dynamics -- 4. E-Risk Insurance Product Design: A Copula Based Bayesian Belief Network Model -- 5. E-Commerce Security and Honesty-Credit -- 6. Towards a Scalable Role and Organization Based Access Control Model with Decentralized Security Administration -- 7. Enterprise Information System Security: A Life-Cycle Approach -- 8. An Alternative Model of Information Security Investment --

Section 2. Privacy and Social Engineering -- 9. Avoiding Pitfalls in Policy-Based Privacy Management -- 10. Privacy and Banking in Australia -- 11. A Multistage Framework to Defend Against Phishing Attacks -- 12. A New Approach to Reducing Social Engineering Impact -- 13. Privacy-Enhancing Technologies -- 14. Social Engineering and its Countermeasures -- 15. Social Networking Site: Opportunities and Security Challenges --

Section 3. Security Education and Awareness -- 16. Designing Antiphishing Education -- 17. Theories Used in Information Security Research: Survey and Agenda -- 18. Information Assurance and Security Curriculum Meeting the SIGITE Guidelines -- 19. Information Security Awareness -- 20. Creating a Security Education, Training, and Awareness Program -- 21. Information Security Within an E-Learning Environment -- 22. Research Notes on Emerging Areas of Conflict in Security --

Section 4. Human and Interaction Issues -- 23. The Human Attack in Linguistic Steganography -- 24. Using Technology to Overcome the Password's Contradiction -- 25. Formal Analysis of Security in Interactive Systems -- 26. Internet Crime: How Vulnerable Are You? Do Gender, Social Influence and Education Play a Role in Vulnerability -- 27. Detecting Shill Bidding in Online English Auctions -- 28. Information Security at Large Public Displays -- 29. The Sense of Security and Trust -- Compilation of References -- About the Contributors -- Index.
Abstract:
"This book offers insightful articles on the most salient contemporary issues of managing social and human aspects of information security"--Provided by publisher.
Added Corporate Author:
Holds: Copies: